
wasp
Trust layer for agentic AI. Block prompt injection at the gate.
Agentic AI systems read messages from untrusted sources. Any input could contain instructions that hijack your agent. Most deployments have no filtering layer.
Every contact gets a trust level. This determines what they can do.
Full access. Can modify the whitelist. This is you.
Can trigger agent actions. Friends, family, colleagues.
Agent sees the message but can't trigger dangerous actions.
Message never reaches the agent. Logged and dropped.
Up and running in 30 seconds.
Choose the integration style that fits your architecture.
Tightest integration. Hooks directly into Moltbot's message pipeline. No network hop.
Lightweight. Observe and annotate messages as they pass through.
Language-agnostic REST API. For non-Moltbot systems or process isolation.
Messages blocked before they hit your LLM's context window.
Block dangerous tools (exec, write) for untrusted senders.
Every decision logged. Full visibility into who accessed what.
100 req/min per IP. Prevents abuse of check endpoints.
WhatsApp, Signal, Telegram, Discord, Slack, Email.
Concurrent-safe. Each session has isolated trust state.
We're not selling snake oil*. Here's what wasp actually does and doesn't do.
“Whitelist doesn't scale for public-facing agents”
→ Correct. Designed for personal/team agents, not anonymous users.
“Compromised trusted contacts have full access”
→ True. One layer, not complete solution. Defense in depth.
“LLM can still exfiltrate in responses”
→ Valid. Output filtering is roadmap. Today we restrict tools, not responses.
“Hardcoded tool lists are inflexible”
→ Fair. Config-driven planned. Secure defaults > footgun flexibility for v1.
“Just a whitelist, trivial”
→ Real value is tool-call interception after LLM decides, before execution. Code-enforced.
“Doesn't solve prompt injection”
→ Nothing does fully. We block untrusted input before context window.
“Not enterprise-ready”
→ It's v0.2 for developers. See WaaSp for commercial path.
“Just use Auth0”
→ Auth0 = human authn. wasp = agent authz. Different problems.
*actually we're not selling anything — wasp is free

Part of the Sandcastle Architecture — lightweight, transparent tools optimized for agentic development.